Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:40

General

  • Target

    fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe

  • Size

    1.1MB

  • MD5

    7efcf50d722b6259120d33df12b5cbdd

  • SHA1

    b1af7de0d8cb5748d87524ffea340c0c414c38a6

  • SHA256

    fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c

  • SHA512

    efd31ef9296271c4b5c0ecd954c53ee6b4a31c7b772ffe9fe11b0c65c6b45a70806b92ff8f63e4c346419d0189433013374dddbc01bf984ad91660e6f0b68cb5

  • SSDEEP

    24576:UyHnLS2B41PUm8xwylQWaPxk2s2X3s9JINiO9UawWKx12rfpsttnLZ:jHLSD1PUfwYQXkR2X3Hr/wlXspstt

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe
    "C:\Users\Admin\AppData\Local\Temp\fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          4⤵
          • Executes dropped EXE
          PID:2336
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 928
            5⤵
            • Program crash
            PID:1736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2268
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 12
            5⤵
            • Program crash
            PID:392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4872
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of UnmapMainImage
            PID:3592
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 12
              6⤵
              • Program crash
              PID:1696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2336 -ip 2336
    1⤵
      PID:2424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2268 -ip 2268
      1⤵
        PID:4676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3592 -ip 3592
        1⤵
          PID:4564

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Modify Existing Service

        1
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Disabling Security Tools

        2
        T1089

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5656254.exe
          Filesize

          961KB

          MD5

          238ae5b81246d7b1cd01cf1eab2e88fb

          SHA1

          2315ee8ad08111f4dce9ab8e438ec179dfeab439

          SHA256

          1a4d7c7ecca9d23730cac3393aeaa8250a1f41a611ee4ea0d5f3beecfbb74eb7

          SHA512

          43d2d2d925fc20f289419f4bcde1df9499b4dc47e97e29917f6ef44f66f54dd186acff24bf328817d74439121b4b26e9ba5613d60115b6f7e80f5a0ffb407c15

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
          Filesize

          702KB

          MD5

          644635a515aa584531dd87d2a84f6086

          SHA1

          4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

          SHA256

          ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

          SHA512

          9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
          Filesize

          702KB

          MD5

          644635a515aa584531dd87d2a84f6086

          SHA1

          4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

          SHA256

          ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

          SHA512

          9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
          Filesize

          904KB

          MD5

          ff7476a8a5499dd42310f0c69f6479a7

          SHA1

          ce359ede5f78a2396bb828d25dec6b3510a3199b

          SHA256

          b045878181b34f72ccfa32dcc8fc5226f56cc8262f6a53f8bd327a32872f0759

          SHA512

          937bcb781ed152af1e63dbf72253ab17f70fee2e7b0a906901cdd4d20f3d12c176cd3d6e286c5e3a6006ade536a92d9b0d9476d571d6adb4ae104c9b485970dc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
          Filesize

          904KB

          MD5

          ff7476a8a5499dd42310f0c69f6479a7

          SHA1

          ce359ede5f78a2396bb828d25dec6b3510a3199b

          SHA256

          b045878181b34f72ccfa32dcc8fc5226f56cc8262f6a53f8bd327a32872f0759

          SHA512

          937bcb781ed152af1e63dbf72253ab17f70fee2e7b0a906901cdd4d20f3d12c176cd3d6e286c5e3a6006ade536a92d9b0d9476d571d6adb4ae104c9b485970dc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2990368.exe
          Filesize

          904KB

          MD5

          ff7476a8a5499dd42310f0c69f6479a7

          SHA1

          ce359ede5f78a2396bb828d25dec6b3510a3199b

          SHA256

          b045878181b34f72ccfa32dcc8fc5226f56cc8262f6a53f8bd327a32872f0759

          SHA512

          937bcb781ed152af1e63dbf72253ab17f70fee2e7b0a906901cdd4d20f3d12c176cd3d6e286c5e3a6006ade536a92d9b0d9476d571d6adb4ae104c9b485970dc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
          Filesize

          306KB

          MD5

          cc1e9ce41b6824fbfe80c60e3a602f16

          SHA1

          50a5f15faad1ed124521683d8acdefc7bde389a3

          SHA256

          854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

          SHA512

          15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
          Filesize

          306KB

          MD5

          cc1e9ce41b6824fbfe80c60e3a602f16

          SHA1

          50a5f15faad1ed124521683d8acdefc7bde389a3

          SHA256

          854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

          SHA512

          15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          Filesize

          185KB

          MD5

          ada578b373b2348cd24a72a1b4d5a72d

          SHA1

          49dfbb816135cff2265df55cb2fa7e2f48d5a574

          SHA256

          cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

          SHA512

          550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          Filesize

          185KB

          MD5

          ada578b373b2348cd24a72a1b4d5a72d

          SHA1

          49dfbb816135cff2265df55cb2fa7e2f48d5a574

          SHA256

          cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

          SHA512

          550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          Filesize

          145KB

          MD5

          94e3e35527bb6312f21ac9ef3fedc750

          SHA1

          ee04792e7cb0be13e62dfcb1990f70b4cf690980

          SHA256

          181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

          SHA512

          a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          Filesize

          145KB

          MD5

          94e3e35527bb6312f21ac9ef3fedc750

          SHA1

          ee04792e7cb0be13e62dfcb1990f70b4cf690980

          SHA256

          181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

          SHA512

          a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

        • memory/2268-213-0x0000000000340000-0x0000000000340000-memory.dmp
        • memory/2268-198-0x0000000000400000-0x000000000042A000-memory.dmp
          Filesize

          168KB

        • memory/2336-192-0x0000000000630000-0x000000000065A000-memory.dmp
          Filesize

          168KB

        • memory/3496-186-0x0000000004A80000-0x0000000004A90000-memory.dmp
          Filesize

          64KB

        • memory/3496-164-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-184-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-185-0x0000000004A80000-0x0000000004A90000-memory.dmp
          Filesize

          64KB

        • memory/3496-180-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-187-0x0000000004A80000-0x0000000004A90000-memory.dmp
          Filesize

          64KB

        • memory/3496-178-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-176-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-174-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-172-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-170-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-154-0x0000000004A90000-0x0000000005034000-memory.dmp
          Filesize

          5.6MB

        • memory/3496-156-0x0000000004A80000-0x0000000004A90000-memory.dmp
          Filesize

          64KB

        • memory/3496-168-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-166-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-182-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-162-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-155-0x0000000004A80000-0x0000000004A90000-memory.dmp
          Filesize

          64KB

        • memory/3496-157-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-158-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3496-160-0x0000000004970000-0x0000000004986000-memory.dmp
          Filesize

          88KB

        • memory/3768-197-0x0000000002C20000-0x0000000002C30000-memory.dmp
          Filesize

          64KB

        • memory/3768-196-0x00000000006D0000-0x00000000007B8000-memory.dmp
          Filesize

          928KB

        • memory/4256-209-0x0000000000400000-0x0000000000438000-memory.dmp
          Filesize

          224KB

        • memory/4256-210-0x0000000000400000-0x0000000000438000-memory.dmp
          Filesize

          224KB

        • memory/4256-212-0x0000000000400000-0x0000000000438000-memory.dmp
          Filesize

          224KB

        • memory/4256-206-0x0000000000400000-0x0000000000438000-memory.dmp
          Filesize

          224KB

        • memory/4256-229-0x0000000000400000-0x0000000000438000-memory.dmp
          Filesize

          224KB

        • memory/4872-230-0x0000000007950000-0x0000000007960000-memory.dmp
          Filesize

          64KB

        • memory/5036-205-0x0000000006EA0000-0x0000000006EB0000-memory.dmp
          Filesize

          64KB

        • memory/5036-204-0x00000000000F0000-0x00000000001E6000-memory.dmp
          Filesize

          984KB